Movatterモバイル変換


[0]ホーム

URL:


EP2013758B1 - Dynamic authentication in secured wireless networks - Google Patents

Dynamic authentication in secured wireless networks
Download PDF

Info

Publication number
EP2013758B1
EP2013758B1EP07755678.5AEP07755678AEP2013758B1EP 2013758 B1EP2013758 B1EP 2013758B1EP 07755678 AEP07755678 AEP 07755678AEP 2013758 B1EP2013758 B1EP 2013758B1
Authority
EP
European Patent Office
Prior art keywords
secret
user
wireless interface
interface device
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP07755678.5A
Other languages
German (de)
French (fr)
Other versions
EP2013758A2 (en
EP2013758A4 (en
Inventor
Tyan-Shu Jou
Ming Sheu
Bo-Chieh Yang
Tian-Yuan Lin
Ted Tsei Kuo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruckus Wireless Inc
Original Assignee
Ruckus Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruckus Wireless IncfiledCriticalRuckus Wireless Inc
Publication of EP2013758A2publicationCriticalpatent/EP2013758A2/en
Publication of EP2013758A4publicationCriticalpatent/EP2013758A4/en
Application grantedgrantedCritical
Publication of EP2013758B1publicationCriticalpatent/EP2013758B1/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Description

    BACKGROUND OF THE INVENTIONField of the Invention
  • The present invention generally relates to information network security. More specifically, the present invention relates to user-friendly, low-maintenance authentication for secured wireless networks.
  • Description of Related Art
  • A variety of user authentication and security measures for wireless networks have been proposed by a number of professional organizations. These professional organizations include the Institute of Electrical and Electronics Engineers (IEEE) 802.11 Working Group, the Wi-Fi Alliance, and the Internet Engineering Task Force (IETF). Implementing these proposals has generally been complicated, difficult to maintain, and requires a high level of technical knowledge by those implementing a particular proposal. Many commercial organizations (e.g., small- and medium-sized businesses), therefore, have been unable to deploy such measures, because of their lack of expertise and/or full-time professional technical support.
  • In early wireless networks (e.g., IEEE 802.11 or Wi-Fi), security was achieved by wired equivalent privacy (WEP) systems. Deploying a WEP system requires only that a network administrator defines a WEP key set at an access point or access device. Any user can access a WEP-secured wireless network by having the same WEP key set manually configured on that user's client station (e.g., a laptop or mobile device). The wireless data communication between the client station and the access point would be encrypted by a defined encryption algorithm utilizing the shared WEP key set.
  • While WEP may work to prevent casual trespassers from accessing the wireless network, WEP would not likely withstand more serious security attacks. WEP keys can be easily discovered, for example, by using publicly available software. Further, WEP does not work to protect network users from each other since all users share the same key. Because of these flaws in WEP-based security systems, alternative security measures evolved. These new measures generally required that wireless network users first be authenticated in some manner and that a key set then be derived and used for wireless traffic encryption. These proposed authentication measures can generally be categorized into two groups: Extensible Authentication Protocol (EAP) and Pre-Shared Key (PSK).
  • The EAP group of security measures generally follows the IEEE 802.1x standard, which utilizes the extensible authentication protocol. EAP-based security systems enable mutual authentication between an authentication server and its users. The authentication server may reside in an access point, base station or an external device. Generally, the authentication server provides for a derived pair-wise master key to be shared between an access point and the user client station. That pair-wise master key may be used to derive a key set, which maybe used for data encryption.
  • A major obstacle in implementing EAP or IEEE 802.1x-based security systems is their complexity. Deploying such systems requires a high level of technical expertise, as well as ongoing technical support for users. Most EAP-based systems, for example, require security certificates to be installed onto authentication servers. Depending on the exact requirements of the EAP-based system, the client stations may also need to be granted the authority to root certificate updates and/or have the security certificate pre-installed before access to the wireless network can be granted.
  • In contrast, PSK security systems are based on a secret shared between and stored at both the client station and the access point. The secret may be, for example, a long bit stream, such as a passphrase, a password, a hexadecimal string, or the like. Used by a client station and the access point to authenticate each other, the secret may also be used to generate an encryption key set.
  • A major shortcoming of PSK-based systems is that the secret has to be manually entered onto client stations and shared by all the client stations. Once the shared secret becomes known to unauthorized personnel, the security of the entire network is compromised. This may pose a problem in organizations that need to provide network access to temporary employees or that have a highly mobile workforce. To maintain the security of a PSK-based system, the secret must be changed on all client stations whenever a person with knowledge of the secret departs from the organization or is no longer authorized to access the network.
  • An example for an electronic terminal device protection system is disclosed inEP 1 724 691 A1 andWO 2005/086012 A1. When participating in a service, an authentication ID and a hardware address of a terminal device used for the service are registered in a communication center. The communication center makes the terminal device download an e-tally of the authentication ID and e-tally information of the hardware address accompanying an application software. When using the service, the e-tally of the hardware address and the tally of the authentication ID which have been acquired according to the e-tally information by the terminal device are sent to the communication center. The communication center correlates the authentication ID received with the authentication ID stored and correlates the tally of the hardware address with the tally of the hardware address stored, thereby authenticating the terminal device to be connected.
  • Further,US 6,772,331 B1 describes a method and a system for enabling wireless devices to be paired or permanently associated by a user or a network administrator. The method and the system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and associate the device with each other. This is useful for associating a wireless headset with a telephone or associating a wireless mouse with a computer.
  • Notwithstanding the many measures available for securing a wireless network, implementing any one of these measures may be complicated, difficult, and/or require extensive maintenance. There is, therefore, a need in the art for improved systems and methods that provide security for wireless networks that are user-friendly and easily maintained without requiring a high degree of technical expertise and ongoing technical support.
  • SUMMARY OF THE INVENTION
  • The invention is defined inclaims 1, 13, and 17, respectively. Particular embodiments are set out in the dependent claims.
  • Exemplary systems and methods of the present invention provide for pairing dynamic secrets in secured wireless networks. A random secret is generated for each authenticated user. That secret is unique to the user, and no other users in the network may use that secret to access the network. Further, the secret is associated, or bound, with the wireless interface belonging to the user, so that no other wireless interface belonging to other users may use that secret to access the network.
  • According to a first aspect of the present invention, methods for pairing such dynamic secrets are disclosed. Associating the secret with a wireless interface may occur immediately after the secret is generated and/or associated with the access profile, or associating the secret with the wireless interface may occur after a delay. Some embodiments associate the secret with the wireless interface by generating an executable to configure the wireless interface to access the wireless network. Configuration may include transferring a copy of the executable to the wireless interface, along with copies of the secret, any security keys derived from the secret, and the user's access profile. Various embodiments of the present invention further include updating the secret, which requires that the wireless interface be reauthenticated before being allowed to reconnect or continue its connection to the wireless network.
  • According to a second aspect of the present invention, systems for pairing dynamic secrets in a secured wireless network are disclosed. Such systems may include a secret generation module, a binding module, and a secret database. The secret is generated by the secret generation module and associated (bound) with a wireless interface by the binding module. The secret database stores information concerning secrets, associations with user profiles, associations with wireless interfaces, and the like. Some embodiments further include an access profile generation module, an executable generation module, and the like. The access profile generation module generates access profiles for users. The executable generation module generates executables for configuring wireless interfaces for access to wireless networks.
  • According to a third aspect of the present invention, computer media and instructions for pairing dynamic secrets in a secured wireless network are disclosed.
  • Some embodiments further include instructions for updating the secrets and requiring that wireless interfaces be reauthenticated.
  • BRIEF DESCRIPTION OF FIGURES
    • FIGURE 1 is an illustration of an authentication system for a secured wireless network in accordance with an exemplary embodiment of the present invention.
    • FIGURE 2 is a flowchart illustrating a method for using paired secrets in a secured wireless network.
    • FIGURE 3 is a flowchart illustrating an alternative method for using paired secrets in a secured wireless network.
    • FIGURE 4 is a flowchart illustrating a method for using security keys in a secured wireless network.
    DETAILED DESCRIPTION
  • The present invention includes systems and methods for using user-friendly, low-maintenance authentication in secured wireless networks through the use of dynamic secrets. Paired secrets are shared between a client station and an access point. These secrets are dynamically generated for each authenticated user and associated with the user's access profile. The secret may also be associated with a specific client station or wireless interface belonging to the user. In some embodiments of the present invention, the secret expires, at which point the user must reauthenticate in order to continue accessing the wireless network.
  • FIGURE 1 is an illustration of anauthentication system 100 for asecured wireless network170 in accordance with an exemplary embodiment of the present invention.Authentication server100, as illustrated inFIGURE 1, includes anauthentication module110, an accessprofile generation module120, asecret generation module130, a database ofsecrets140, abinding module150, and anexecutable generation module 160. Theauthentication server100 may be used to maintain security innetwork170. Various client devices, such aswireless workstation180a,laptop180b, andmobile device180c belong to potential users ofnetwork170.
  • A module (or application), as referenced in the present invention, should be generally understood as a collection of routines that perform various system-level functions and may be dynamically loaded and unloaded by hardware and device drivers as required. The modular software components described herein may also be incorporated as part of a larger software platform or integrated as part of an application specific component.
  • Authentication module110 authenticates a user (e.g.,laptop180b) and verifies that the user is who they purport to be and that they are otherwise authorized to accessnetwork170. Theauthentication module110 may be used to verify a user name and password supplied by the user. Verification may occur through comparison with user names and passwords stored in an authentication database, which may be independent of or incorporated intoauthentication module 110. In some embodiments, the authentication database may be integrated withsecret database 140 as is described below. Once authenticated byauthentication module110, the user may access data and perform actions withinnetwork170 based on the user's security clearance level, the parameters of the user's role in the organization, as defined by a network administrator, and as may be further governed by a paired secret or derived keys.
  • Accessprofile generation module120 generates an access profile for a user authenticated byauthentication module110. A user access profile may include, at the least, a random paired secret and an executable as is further described herein. An access profile may further include information concerning the user, such as authentication information, security information, user preferences, and the like. To access thenetwork170, a user copies, downloads, or otherwise transfers the user access profile to the user's client device (e.g.,laptop180b). Access profiles may be securely obtained via a common web browser utilizing hypertext transfer protocol over secure socket layer (HTTPS). The executable automatically configures a wireless device so that they may access thewireless network170.
  • Secret generation module130 generates a random secret for each user. Various algorithms and formulas may be used bysecret generation module130 to randomly generate secrets. By providing for random secrets,secret generation module130 increases the difficulty for potential trespassers to deduce or otherwise determine a particular secret and illicitly gain access tonetwork170.Secret generation module130 is further configured to determine that each secret is unique to each user, so that each secret may only be used by one user. The secret may be bundled as part of an access profile. The secret will be used to authenticate a wireless device so that the wireless device can access thewireless network 170. In some embodiments,secret generation module130 may derive from a particular secret a set of one or more security keys for a user. Like secrets, security keys may be associated with a wireless device and used in configuring the wireless interface so that it may access thewireless network170. Also like secrets, no other wireless device may then use those same security keys to access thenetwork170.
  • Secret database140 stores information concerning various secrets generated bysecret generation module130.Secret database140 may also store information concerning which user is associated with a particular secret, any security keys derived from a secret, which wireless device, if any, is associated with a user's secret or security keys, and the like.Secret database140 may further store information concerning user names, passwords, security clearance levels, and the like.Secret database140 may operate in conjunction withauthentication module110 to authenticate users and interfaces belonging to the users to thenetwork170.
  • Bindingmodule150 is configured to associate (bind) a user's secret to a wireless interface device belonging to the user (e.g.,workstation180a,laptop180b, ormobile device180c). The association formed by bindingmodule150 between a secret and a user's wireless interface device is required for the wireless interface to be authenticated and allowed access to thewireless network170. In some instances, immediately after secret generation and/or association with an access profile, bindingmodule150 associates the user's secret to the user's wireless interface device (if the user is using a wireless interface device) or a profile assigned to the interface device. The immediate operation ofbinding module150 may be referred to as prompt binding. Alternatively, the operations ofbinding module150 may be delayed until the user initiates the first wireless connection via the wireless interface and the MAC address of the user's wireless device may be determined. The delayed operation ofbinding module150 may be referred to as delayed binding.
  • Anexecutable generation module160 generates an executable application that configures a wireless interface for access to thewireless network170. The executable generated byexecutable generation module160 may then be copied, downloaded, or otherwise transferred to a wireless interface belonging to the user. The executable may be bundled as part of an access profile. The executable installs the access profile generated by accessprofile generation module120 and the secret generated bysecret generation module 130 onto the wireless device. Generation of this executable and the aforementioned access profile are further disclosed inU.S. provisional patent application 60/796,845.
  • Network170 may be configured to transmit various electromagnetic waves, including, for example, radio signals.Network 170 may be an IEEE 802.11 (Wi-Fi or Wireless LAN) network, IEEE 802.16 (WiMAX) network, IEEE 802.16c network, or the like.Network170 may convey various kinds of information to interface devices, such asclient interface devices180a-c.Network 170 may be a local, proprietary network or may be a part of a larger wide-area network. Various subsidiary networks may reside within the realm ofgreater network170 such as peer-to-peer or wireless mesh networks.
  • Client interface devices180a-c illustrate a variety of wireless-capable interfaces, including desktop computers, laptop computers, handheld computers, and the like. A user wishing to access thewireless network 170 throughwireless interface180a, for example, may do so by copying, downloading, or otherwise transferring towireless interface180a a copy of the user's access profile generated by accessprofile generation module120, a secret generated bysecret generation module130, and an installation executable generated byexecutable generation module160. The executable configureswireless interface180a so thatwireless interface180a can access thewireless network 170 utilizing an access profile and paired secret as part of an overall authentication operation.Wireless interface180b andwireless interface180c may be configured in similar fashion.
  • A user's secret may be updated periodically or in response to a request by a network administrator. A new secret may be generated for the user bysecret generation module130, associated with the user's access profile, and saved to thesecret database140. If the previous secret has expired, the wireless interface must be reauthenticated. The user must either reauthenticate immediately or reauthenticate at the next wireless connection. Reauthenticating the wireless device may include reauthenticating the user, transferring copies of the user's new secret, access profile, and/or a new executable, and, usingbinding module140, forming a new association between the wireless interface and the new secret.
  • FIGURE 2 is a flowchart illustrating amethod200 for using paired secrets in asecured wireless network170. Inmethod200, a user is authenticated, a random and unique paired secret is generated for the user, the secret is associated with an access profile belonging to the user, and the secret is further associated (bound) with a wireless interface belonging to the user and further associated with a particular access profile.
  • In step210, the user is authenticated usingauthentication module110. Initial authentication may include providing a user name and password identifying the user as a particular user. That user may or may not be authorized to access thenetwork170 as may be determined with respect to paired secrets. If a user cannot be authenticated through a simple user name and password match (or subsequently with respect to paired secrets), the user may not be allowed to access thewireless network170.
  • Instep220, a secret is generated for the provisionally authenticated user. Generated bysecret generation module130, the secret may be determined through various algorithms or formulas so that a randomly generated secret is produced for the authenticated user. Further, the secret is unique to each user in thenetwork170. The uniqueness of the secret for each user provides each user protection from all other users in thenetwork170. Because each user has a secret uniquely bound to that specific user (or their profile and/or interface device), there is no way for a user to use another user's secret. Further, when a particular user is no longer authorized to use thenetwork170, that user's de-authorization does not affect the ability of other users to continue using thenetwork 170 as is the case in many prior art network security solutions. Further, de-authorization of a particular user does it require any particular technical expertise or technical support to maintain the security of thenetwork170. Also instep220, other information entities associated with the wireless authentication mechanism, such as authority certificates, may be generated.
  • Instep230, the secret generated for an authenticated user is associated with that user's access profile, which may be further associated with a particular interface device. Information concerning the association between the secret and the user access profile may be saved insecret database150.
  • Instep240, the secret is associated (bound) with a wireless interface belonging to the authenticated user, their profile, and/or device. The association may be formed by bindingmodule140 and allows the wireless interface device to access thewireless network170. The association, or binding, may include downloading an access profile, a paired secret and associated derived security keys, and an executable for configuring and associating the wireless interface device with the secret. The secret may be associated with the wireless interface by associating the secret with a specific radio of the wireless interface, a MAC address of the wireless interface, or the like. Information concerning the association between the paired secret and wireless interface may be saved insecret database150.
  • FIGURE 3 is a flowchart illustrating analternative method300 for using secrets in asecured wireless network170. In thismethod300, the user is authenticated as may occur through an initial user name and password verification process, an access profile is generated, and a secret is generated. If a known wireless interface is connected to thenetwork170, then that wireless interface is associated (bound) with the secret. If there is no known wireless interface currently connected to thenetwork170, then the unassociated secret may be saved and can be later associated with a wireless interface.
  • In step310, the user is authenticated byauthentication module110. The authentication may be performed in a similar fashion to the authentication performed in step210.
  • In step320, an access profile is generated for the authenticated user. The access profile, generated by accessprofile generation module120, may be used to configure a wireless interface belonging to the user so that they may access thenetwork170.
  • Instep330, a secret is generated for the user. The generation of the secret may be performed in a manner similar to that ofstep220 ofFIGURE 2.
  • Instep340, the determination is made whether the current network connection is through a known wireless interface. The determination may be based on authentication information, user input, or the like.
  • Instep350, where the connection is (for example) determined not to be a known wireless interface already having a bound secret, the most recently generated secret is saved to a table. The table may be included insecret database150. Where the user is not using a wireless interface, the wireless interface is not the intended interface to be used in a multi-wireless-interface (radio) device, the user is not using the user's own wireless interface, or the user is otherwise not ready to associate the wireless interface with the secret, the secret may be saved to the table for later use..
  • Instep360, where the connection is determined to be a known wireless interface not having a bound secret, having an expired secret, or otherwise in need of a bound secret, the secret is bound with the wireless interface. The association may be formed in a similar manner as the association formed instep240.
  • FIGURE 4 is a flowchart illustrating amethod400 for using security keys in asecured wireless network170. In this method, an authentication request is received from a wireless interface. It is then determined whether a security key is associated with the interface, and if so, it is determined whether the security key is valid. If the security key is valid, then the wireless interface is successfully authenticated. If the security key is not valid, the authentication request is denied. If there is no security key associated with the interface, it is determined whether there are any unassociated security keys for the user. If there are unassociated security keys, then the next unassociated security key is obtained. It is then determined whether the security key is valid. If the security key is not valid, it is determined again whether there are any unassociated security keys. If there are no unassociated security keys left, the authentication request is denied. If there is an available unassociated security key and it is valid, then the security key is bound to the interface, and the wireless interface is successfully authenticated.
  • Instep410, an authentication request is received from a wireless interface belonging to a user. This request may occur when the wireless interface is new to thenetwork 170, for wireless interfaces whose security key has expired, for wireless interfaces whose connection was terminated, or the like.
  • Instep420, it is determined whether there is a security key associated with the wireless interface. The determination may be made from information in the wireless interface authentication process. If there is an associated security key, the method proceeds to step430. If there is no associated security key, the method proceeds to step440.
  • Instep430, where the security key is determined to be associated with the wireless interface, it is then determined whether that security key is valid. The determination may be made by comparing the security key information from the authentication request with the security key insecret database150.
  • Instep440, where there is no security key associated with thewireless network170, it is determined whether there are any unassociated security keys for the user. The determination may be made based on information from the authentication request, security key information associated with the user access profile saved insecret database150, and the like. If there is an unassociated security key available, the method proceeds to step450. If there are no unassociated security keys available, the method proceeds to step 490.
  • Instep450, where it was determined that there are unassociated security keys available, the next unassociated security key is obtained. All unassociated security keys are saved to a table, as described instep350. In some embodiments, the table is included insecret database 150. Instep450, the next available unassociated security key from the table is considered.
  • Instep460, it is determined whether the security key under consideration is valid. The determination of whether the security key is valid is similar to the determination made instep430. If the security key is not valid, the method returns to step440. If the security key is valid, the method proceeds to step470.
  • Instep470, the security key is bound to the wireless interface. The binding, or association, is formed similarly to the association formed insteps240 and360.
  • Instep480, the authentication of the wireless interface by security key is successful. In some embodiments, the method may proceed with further authentication steps. For example, instep500, a determination may be made as to whether the security key has expired. If the key has expired, a re-keying process may commence instep520. In the interim, however, the user may be subjected to restricted access or no access whatsoever. In some embodiments, the re-keying process may be a part of a different process while the user has limited or no access privileges. If the key is still valid, however, the user may enjoy full service access in step510. Authenticating the wireless interface, however, allows the wireless interface to access thewireless network170.
  • Instep490, the authentication request is denied. The wireless interface is not allowed to access thewireless network170, or if there is an existing connection, it may be terminated.
  • While the present invention has been described in connection with a series of preferred embodiment, these descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art.

Claims (18)

  1. A method for pairing dynamic secrets in a secured wireless network (170), the method comprising:
    generating (220) a random secret for an authenticated user, wherein the secret is unique to the user;
    associating (230) the secret with an access profile belonging to the user, wherein the secret governs user access and actions within the network as indicated by the access profile, and wherein the user is allowed to access data and perform actions within the secured wireless network (170) based on a security clearance level of the user;
    associating (240) the secret with a wireless interface device belonging to the user associated with the access profile, wherein the wireless interface device is configured to access the secured wireless network (170) using the secret, and wherein use of the secret to access the secured wireless network (170) is restricted to the associated wireless interface device belonging to the user as identified by the access profile;
    receiving (410) an authentication request from the wireless interface device, the authentication request identifying the user and including a security key derived from the secret;
    verifying (430) that the security key is valid by comparing the received security key to a security key in a secret database; and
    granting (510) the wireless interface device access to the secured wireless network (170) following a determination that the security key is valid and has not expired.
  2. The method of claim 1, wherein associating (240) the secret with the wireless interface device comprises:
    generating an executable for configuring the wireless interface device to access the secured wireless network (170);
    transferring the executable and the secret to the wireless interface device as a part of the access profile; and
    executing the executable on the wireless interface device, wherein the executable configures the wireless interface device to access the secured wireless network (170) using the access profile and the secret.
  3. The method of claim 1, wherein associating (240) the secret with the wireless interface device includes deriving one or more security keys from the secret.
  4. The method of claim 2 or 3, wherein associating (240) the secret with the wireless interface device further comprises associating the security key with the wireless interface device, wherein the use of the security key to access the secured wireless network (170) is restricted to the wireless interface device.
  5. The method of claim 3, further comprising saving the one or more security keys to a table, wherein the table comprises information concerning each key, whether each security key is associated with a wireless interface device, and which wireless interface device is associated with each security key.
  6. The method of claim 1, wherein associating (240) the secret to the wireless interface device comprises associating the secret with the identification of the wireless interface device.
  7. The method of claim 6, wherein the wireless interface identification includes a MAC address.
  8. The method of claim 1, wherein associating (240) the secret to the wireless interface device comprises associating the secret with a radio of the wireless interface device.
  9. The method of claim 1, further comprising updating the secret.
  10. The method of claim 9, wherein updating the secret occurs after a predefined period of time or upon request by a system administrator.
  11. The method of claim 9, wherein updating the secret comprises:
    generating a new random secret unique to the user;
    associating the new secret with the access profile belonging to the user; and
    requiring that the wireless interface device be reauthenticated by the user before associating the new secret to the wireless interface device.
  12. The method of claim 11, wherein requiring the wireless interface device to be reauthenticated comprises terminating the wireless connection between the wireless interface device and the secured wireless network (170).
  13. A system for pairing dynamic secrets in a secured wireless network (170), the system comprising:
    a secret generation module (130) stored in memory and executable by a processor to generate a random secret unique to an authenticated user, wherein the secret governs user access and actions within the network as indicated by an access profile belonging to the user and wherein the user is allowed to access data and perform actions within the secured wireless network (170) based on a security clearance level;
    a binding module (150) stored in memory and executable by the processor to associate the secret with the access profile and a wireless interface device belonging to the authenticated user associated with the access profile, wherein the wireless interface device is configured to access the secured wireless network (170), and wherein use of the secret to access the secured wireless network (170) is restricted to the associated wireless interface device belonging to the user as identified by the access profile;
    a secret database (140) configured to store information concerning at least one secret and the associated wireless interface device;
    a communication interface adapted to receive (410) an authentication request from the wireless interface device, the authentication request identifying the user and including a security key derived from the secret; and
    a processor adapted to execute instructions, wherein execution of the instructions by the processor:
    verifies (430) that the security key is valid by comparing the received security key to a security key in the secret database, and
    grants (510) the wireless interface device access to the secured wireless network (170) following a determination that the security key is valid and has not expired.
  14. The system of claim 13, further comprising an access profile generation module (120) executable by the processor to generate the access profile for the authenticated user.
  15. The system of claim 13, further comprising an executable generation module (160) executable by the processor to generate an executable for using the access profile and the secret to configure the wireless interface device to access the wireless network (170).
  16. The system of claim 13, wherein the secret generation module (130) is further executable by the processor to update the secret by generating a new random secret unique to the user.
  17. A computer-readable storage medium having embodied thereon a program, the program being executable by a computer processor to perform a method for pairing dynamic secrets in a secured wireless network (170), the method comprising:
    generating (220) a random secret for an authenticated user, wherein the secret is unique to the user;
    associating (230) the secret with an access profile belonging to the user, wherein the secret governs user access and actions within the network as indicated by the access profile, and wherein the user is allowed to access data and perform actions within the secured wireless network (170) based on a security clearance level;
    associating (240) the secret with a wireless interface device belonging to the user associated with the access profile, wherein the wireless interface device is configured to access the secured wireless network (170) using the secret, and wherein use of the secret to access the wireless network (170) is restricted to the associated wireless interface device belonging to the user as identified by the access profile;
    receiving (410) an authentication request from the wireless interface device, the authentication request identifying the user and including a security key derived from the secret;
    verifying (430) that the security key is valid by comparing the received security key to a security key in a secret database; and
    granting (510) the wireless interface device access to the secured wireless network (170) following a determination that the security key is valid and has not expired.
  18. The computer-readable storage medium of claim 17, wherein the program is further executable by the processor to update the secret, wherein the wireless interface device must be reauthenticated by the user.
EP07755678.5A2006-04-242007-04-18Dynamic authentication in secured wireless networksActiveEP2013758B1 (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US79462506P2006-04-242006-04-24
US79684506P2006-05-022006-05-02
PCT/US2007/009503WO2007127120A2 (en)2006-04-242007-04-18Dynamic authentication in secured wireless networks

Publications (3)

Publication NumberPublication Date
EP2013758A2 EP2013758A2 (en)2009-01-14
EP2013758A4 EP2013758A4 (en)2012-01-25
EP2013758B1true EP2013758B1 (en)2016-08-03

Family

ID=38656104

Family Applications (2)

Application NumberTitlePriority DateFiling Date
EP07755678.5AActiveEP2013758B1 (en)2006-04-242007-04-18Dynamic authentication in secured wireless networks
EP07755913.6AActiveEP2014067B1 (en)2006-04-242007-04-23Provisioned configuration for automatic wireless connection

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
EP07755913.6AActiveEP2014067B1 (en)2006-04-242007-04-23Provisioned configuration for automatic wireless connection

Country Status (4)

CountryLink
US (5)US7788703B2 (en)
EP (2)EP2013758B1 (en)
CN (1)CN103441984B (en)
WO (2)WO2007127120A2 (en)

Families Citing this family (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7669233B2 (en)*1999-09-102010-02-23Metavante CorporationMethods and systems for secure transmission of identification information over public networks
EP1958369B1 (en)2005-12-012015-04-08Ruckus Wireless, Inc.On-demand services by wireless base station virtualization
US9071583B2 (en)2006-04-242015-06-30Ruckus Wireless, Inc.Provisioned configuration for automatic wireless connection
US9769655B2 (en)2006-04-242017-09-19Ruckus Wireless, Inc.Sharing security keys with headless devices
EP2013758B1 (en)2006-04-242016-08-03Ruckus Wireless, Inc.Dynamic authentication in secured wireless networks
US8948046B2 (en)2007-04-272015-02-03Aerohive Networks, Inc.Routing method and system for a wireless network
US8135384B2 (en)*2007-11-292012-03-13Microsoft CorporationPolicy enforcement for multi-radio transmission and reception
EP2134063B1 (en)2008-05-122013-10-02BlackBerry LimitedMethods and apparatus for use in facilitating access to a communication service via WLAN hotspot
US8218502B1 (en)2008-05-142012-07-10Aerohive NetworksPredictive and nomadic roaming of wireless clients across different network subnets
US9674892B1 (en)*2008-11-042017-06-06Aerohive Networks, Inc.Exclusive preshared key authentication
US8483194B1 (en)2009-01-212013-07-09Aerohive Networks, Inc.Airtime-based scheduling
US11115857B2 (en)2009-07-102021-09-07Extreme Networks, Inc.Bandwidth sentinel
US9900251B1 (en)2009-07-102018-02-20Aerohive Networks, Inc.Bandwidth sentinel
TWI401979B (en)*2009-10-142013-07-11Ind Tech Res InstAccess authorization method and apparatus for a wireless sensor network
CN102055728B (en)*2009-11-022013-11-06中华电信股份有限公司 System login method to avoid account fraudulent use
US8683196B2 (en)*2009-11-242014-03-25Red Hat, Inc.Token renewal
US8671187B1 (en)2010-07-272014-03-11Aerohive Networks, Inc.Client-independent network supervision application
US8484724B2 (en)*2010-07-292013-07-09Bank Of America CorporationUser permissions in computing systems
JP5053424B2 (en)*2010-07-292012-10-17株式会社バッファロー RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD
US9002277B2 (en)2010-09-072015-04-07Aerohive Networks, Inc.Distributed channel selection for wireless networks
US8948382B2 (en)2010-12-162015-02-03Microsoft CorporationSecure protocol for peer-to-peer network
US8971841B2 (en)2010-12-172015-03-03Microsoft CorporationOperating system supporting cost aware applications
CN103858106B (en)2011-05-012017-04-26鲁库斯无线公司remote cable access point reset
US8422540B1 (en)2012-06-212013-04-16CBF Networks, Inc.Intelligent backhaul radio with zero division duplexing
US8467363B2 (en)2011-08-172013-06-18CBF Networks, Inc.Intelligent backhaul radio and antenna system
US10091065B1 (en)2011-10-312018-10-02Aerohive Networks, Inc.Zero configuration networking on a subnetted network
US8756668B2 (en)2012-02-092014-06-17Ruckus Wireless, Inc.Dynamic PSK for hotspots
US9092610B2 (en)2012-04-042015-07-28Ruckus Wireless, Inc.Key assignment for a brand
CN104769864B (en)2012-06-142018-05-04艾诺威网络有限公司 Multicast to Unicast Conversion Technology
CN102791014A (en)*2012-07-182012-11-21诚迈科技(南京)有限公司Short-distance pairing method of wifi (wireless fidelity) mobile terminal
US9088891B2 (en)2012-08-132015-07-21Wells Fargo Bank, N.A.Wireless multi-factor authentication with captive portals
US9619017B2 (en)*2012-11-072017-04-11Qualcomm IncorporatedTechniques for utilizing a computer input device with multiple computers
US9622075B2 (en)2013-01-312017-04-11Dell Products L.P.System and method for adaptive multifactor authentication
US10389650B2 (en)2013-03-152019-08-20Aerohive Networks, Inc.Building and maintaining a network
US9413772B2 (en)2013-03-152016-08-09Aerohive Networks, Inc.Managing rogue devices through a network backhaul
US20150026330A1 (en)*2013-07-162015-01-22Cellco Partnership D/B/A Verizon WirelessGenerating unique identifiers for mobile devices
US9763094B2 (en)*2014-01-312017-09-12Qualcomm IncorporatedMethods, devices and systems for dynamic network access administration
US10430779B2 (en)*2014-04-082019-10-01Capital One Services LlcSystems and methods for transacting at an ATM using a mobile device
CN105376735A (en)*2014-07-022016-03-02北京奇虎科技有限公司Password acquiring method, wireless network supplying equipment and network system
CN109002052A (en)2014-07-312018-12-14深圳市大疆创新科技有限公司The virtual tours system and method realized using unmanned vehicle
CN105389319A (en)*2014-09-092016-03-09中兴通讯股份有限公司Database operation method and device
CN105635039B (en)*2014-10-272019-01-04阿里巴巴集团控股有限公司A kind of secure communication of network method and communication device
US9686676B2 (en)*2015-01-162017-06-20Nokia Technologies OyMethod, apparatus, and computer program product for a server controlled device wakeup
CN104754563A (en)*2015-03-062015-07-01广东欧珀移动通信有限公司 A wireless hotspot access sharing method, mobile terminal and system
CN104777752A (en)*2015-03-202015-07-15云丁网络技术(北京)有限公司Intelligent household system and quick pairing method thereof
CN105635097A (en)*2015-06-292016-06-01宇龙计算机通信科技(深圳)有限公司Wi-Fi connection method, terminal, Wi-Fi device, Wi-Fi connection control method and server
WO2017031343A1 (en)2015-08-192017-02-23Shen WinifredSystems and methods for authenticating users accessing a secure network with one-session-only, on-demand login credentials
CN105263194A (en)*2015-09-182016-01-20北京金山安全软件有限公司Method and device for establishing communication connection between mobile equipment and fixed equipment
CN105187452A (en)*2015-10-202015-12-23上海斐讯数据通信技术有限公司Wireless network authentication method and system based on APP control
CN105282163B (en)*2015-10-292020-04-07广州视睿电子科技有限公司Network access method and equipment
CN105516970B (en)*2015-11-172019-07-09上海礼源网络科技有限公司A kind of WIFI authentication method and intelligent router, connecting internet system
US20170238235A1 (en)2016-02-172017-08-17Zitovault, Inc.Wireless router and router management system
WO2017165043A1 (en)*2016-03-252017-09-28Zitovault, Inc.Mac address-bound wlan password
US11044240B2 (en)2016-08-012021-06-22At&T Intellectual Property I, L.P.Method and system to manage access to a wireless local area network
US10097996B2 (en)2016-08-012018-10-09At&T Intellectual Property I, L.P.Method and system to dynamically authenticate and grant access to non-trusted anonymous Wi-Fi
CN106131830A (en)*2016-08-302016-11-16林昌盛威(北京)科技有限公司A kind of data processing method, Apparatus and system
CN110268688B (en)2016-12-302022-02-25英国电讯有限公司Device auto-pairing
EP3563599B1 (en)2016-12-302021-10-13British Telecommunications Public Limited CompanyAutomatic pairing of devices to wireless networks
EP3563598B1 (en)2016-12-302021-11-03British Telecommunications Public Limited CompanyAutomatic pairing of devices to wireless networks
CN107426161A (en)*2017-05-092017-12-01成都市宏山科技有限公司A kind of home router login validation method
CN106936854A (en)*2017-05-092017-07-07成都市宏山科技有限公司For the safety system of router
US10932129B2 (en)2017-07-242021-02-23Cisco Technology, Inc.Network access control
CN107277808B (en)*2017-07-272023-01-03浩鲸云计算科技股份有限公司Method for wireless terminal to access wireless network by using independent dynamic key
US10666628B2 (en)*2017-08-042020-05-26Apple Inc.Secure authentication of device identification for low throughput device to-device wireless communication
US11089475B2 (en)*2018-11-062021-08-10Red Hat, Inc.Booting and operating computing devices at designated locations
US11561606B2 (en)*2018-11-212023-01-24Johnson Controls Tyco IP Holdings LLPSystems and methods for reducing wi-fi station power
US11640455B2 (en)2021-05-272023-05-02Bank Of America CorporationSystems and methods for dynamic polychrome lattice image security
TWI789142B (en)*2021-12-032023-01-01新唐科技股份有限公司Controller, computing device, bios recovery and backup method
US11968215B2 (en)2021-12-162024-04-23Bank Of America CorporationDistributed sensor grid for intelligent proximity-based clustering and authentication
US12341909B2 (en)2022-10-282025-06-24T-Mobile Usa, Inc.Authenticating a user interacting with a wireless telecommunication network via a non-internet connected phone

Family Cites Families (268)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4176356A (en)1977-06-271979-11-27Motorola, Inc.Directional antenna system including pattern control
US4193077A (en)1977-10-111980-03-11Avnet, Inc.Directional antenna system with end loaded crossed dipoles
GB1578469A (en)1977-11-051980-11-05Marconi Co LtdTropospheric scatter radio communications systems
FR2445036A1 (en)1978-12-221980-07-18Thomson Csf ELECTRONIC SCANNING MICROWAVE DEPHASER AND ANTENNA HAVING SUCH A PHASER
US4513412A (en)1983-04-251985-04-23At&T Bell LaboratoriesTime division adaptive retransmission technique for portable radio telephones
US4814777A (en)1987-07-311989-03-21Raytheon CompanyDual-polarization, omni-directional antenna system
US5095535A (en)1988-07-281992-03-10Motorola, Inc.High bit rate communication system for overcoming multipath
US5097484A (en)1988-10-121992-03-17Sumitomo Electric Industries, Ltd.Diversity transmission and reception method and equipment
US5173711A (en)1989-11-271992-12-22Kokusai Denshin Denwa Kabushiki KaishaMicrostrip antenna for two-frequency separate-feeding type for circularly polarized waves
US5203010A (en)1990-11-131993-04-13Motorola, Inc.Radio telephone system incorporating multiple time periods for communication transfer
US5373548A (en)1991-01-041994-12-13Thomson Consumer Electronics, Inc.Out-of-range warning system for cordless telephone
JP3038933B2 (en)1991-01-312000-05-08ソニー株式会社 System controller for video signal processor
AU638379B2 (en)1991-08-281993-06-24Motorola, Inc.Cellular system sharing of logical channels
US5220340A (en)1992-04-291993-06-15Lotfollah ShafaiDirectional switched beam antenna
US5507035A (en)1993-04-301996-04-09International Business Machines CorporationDiversity transmission strategy in mobile/indoor cellula radio communications
US6034638A (en)1993-05-272000-03-07Griffith UniversityAntennas for use in portable communications devices
US5559800A (en)1994-01-191996-09-24Research In Motion LimitedRemote control of gateway functions in a wireless data communication network
US5802312A (en)1994-09-271998-09-01Research In Motion LimitedSystem for transmitting data files between computers in a wireless environment utilizing a file transfer agent executing on host system
US5973601A (en)1995-12-061999-10-26Campana, Jr.; Thomas J.Method of radio transmission between a radio transmitter and radio receiver
CA2173304C (en)1995-04-212003-04-29Anthony J. DezonnoMethod and system for establishing voice communications using a computer network
US5964830A (en)1995-08-221999-10-12Durrett; Charles M.User portal device for the world wide web to communicate with a website server
GB9517241D0 (en)1995-08-231995-10-25Philips Electronics Uk LtdPrinted antenna
US5767809A (en)1996-03-071998-06-16Industrial Technology Research InstituteOMNI-directional horizontally polarized Alford loop strip antenna
JPH11163621A (en)1997-11-271999-06-18Kiyoshi YamamotoPlane radiation element and omnidirectional antenna utilizing the element
ES2619367T3 (en)*1998-05-212017-06-26Equifax Inc. System and method for network user authentication
US6345043B1 (en)1998-07-062002-02-05National Datacomm CorporationAccess scheme for a wireless LAN station to connect an access point
US20020170064A1 (en)2001-05-112002-11-14Monroe David A.Portable, wireless monitoring and control station for use in connection with a multi-media surveillance system having enhanced notification functions
US6100843A (en)1998-09-212000-08-08Tantivy Communications Inc.Adaptive antenna for use in same frequency networks
US6404386B1 (en)1998-09-212002-06-11Tantivy Communications, Inc.Adaptive antenna for use in same frequency networks
US7116707B1 (en)1998-11-052006-10-03Cisco Technology, Inc.Modem failover without call loss
US6266528B1 (en)1998-12-232001-07-24Arraycomm, Inc.Performance monitor for antenna arrays
US6442507B1 (en)1998-12-292002-08-27Wireless Communications, Inc.System for creating a computer model and measurement database of a wireless communication network
JP2001036337A (en)1999-03-052001-02-09Matsushita Electric Ind Co Ltd Antenna device
US6356905B1 (en)1999-03-052002-03-12Accenture LlpSystem, method and article of manufacture for mobile communication utilizing an interface support framework
US6498589B1 (en)1999-03-182002-12-24Dx Antenna Company, LimitedAntenna system
CA2270302A1 (en)1999-04-282000-10-28Superpass Company Inc.High efficiency printed antennas
US6772331B1 (en)*1999-05-212004-08-03International Business Machines CorporationMethod and apparatus for exclusively pairing wireless devices
DE60029217T2 (en)*1999-05-212007-05-31International Business Machines Corp. METHOD AND DEVICE FOR INITIALIZING SAFE CONNECTIONS BETWEEN AND BETWEEN ONLY CUSTOMIZED CORDLESS EQUIPMENT
US6493679B1 (en)1999-05-262002-12-10Wireless Valley Communications, Inc.Method and system for managing a real time bill of materials
US6317599B1 (en)1999-05-262001-11-13Wireless Valley Communications, Inc.Method and system for automated optimization of antenna positioning in 3-D
US6725281B1 (en)1999-06-112004-04-20Microsoft CorporationSynchronization of controlled device state using state table and eventing in data-driven remote device control model
US6910068B2 (en)1999-06-112005-06-21Microsoft CorporationXML-based template language for devices and services
US6892230B1 (en)1999-06-112005-05-10Microsoft CorporationDynamic self-configuration for ad hoc peer networking using mark-up language formated description messages
ATE294480T1 (en)1999-06-112005-05-15Microsoft Corp GENERAL API FOR DEVICE REMOTE CONTROL
JP3672770B2 (en)1999-07-082005-07-20株式会社国際電気通信基礎技術研究所 Array antenna device
US6499006B1 (en)1999-07-142002-12-24Wireless Valley Communications, Inc.System for the three-dimensional display of wireless communication system performance
WO2001013461A1 (en)1999-08-132001-02-22Rangestar Wireless, Inc.Diversity antenna system for lan communication system
JP2001057560A (en)1999-08-182001-02-27Hitachi Kokusai Electric Inc Wireless LAN system
US6292153B1 (en)1999-08-272001-09-18Fantasma Network, Inc.Antenna comprising two wideband notch regions on one coplanar substrate
SE515047C2 (en)1999-10-012001-06-05Tryggit Ab Method and system for verification of service order
SE0002617D0 (en)1999-10-292000-07-11Allgon Ab An antenna device for transmitting and / or receiving RF waves
US6307524B1 (en)2000-01-182001-10-23Core Technology, Inc.Yagi antenna having matching coaxial cable and driven element impedances
US7505762B2 (en)2004-02-272009-03-17Fusionone, Inc.Wireless telephone data backup system
US6356242B1 (en)2000-01-272002-03-12George PloussiosCrossed bent monopole doublets
WO2001071608A2 (en)2000-03-172001-09-27Mark NairSystem, method and apparatus for controlling the dissemination of digital works
GB0006955D0 (en)2000-03-232000-05-10Koninkl Philips Electronics NvAntenna diversity arrangement
US7266369B2 (en)2000-04-042007-09-04Samsung Electronics Co., Ltd.System and method for provisioning or updating a mobile station using over-the-air transfer of interpreted byte-code program
US6701522B1 (en)2000-04-072004-03-02Danger, Inc.Apparatus and method for portal device authentication
US20020022483A1 (en)2000-04-182002-02-21Wayport, Inc.Distributed network communication system which allows multiple wireless service providers to share a common network infrastructure
US6785816B1 (en)2000-05-012004-08-31Nokia CorporationSystem and method for secured configuration data for programmable logic devices
US8355912B1 (en)2000-05-042013-01-15International Business Machines CorporationTechnique for providing continuous speech recognition as an alternate input device to limited processing power devices
JP3386439B2 (en)2000-05-242003-03-17松下電器産業株式会社 Directivity switching antenna device
EP1158605B1 (en)2000-05-262004-04-14Sony International (Europe) GmbHV-Slot antenna for circular polarization
JP4501230B2 (en)2000-05-302010-07-14株式会社日立製作所 IPv4-IPv6 multicast communication method and apparatus
US6326922B1 (en)2000-06-292001-12-04Worldspace CorporationYagi antenna coupled with a low noise amplifier on the same printed circuit board
FI111208B (en)*2000-06-302003-06-13Nokia Corp Arrangement of data encryption in a wireless telecommunication system
US6356243B1 (en)2000-07-192002-03-12Logitech Europe S.A.Three-dimensional geometric space loop antenna
US6625454B1 (en)2000-08-042003-09-23Wireless Valley Communications, Inc.Method and system for designing or deploying a communications network which considers frequency dependent effects
DE60037465T2 (en)2000-08-102008-12-04Fujitsu Ltd., Kawasaki Device for communicating with diversity
US7043633B1 (en)*2000-08-282006-05-09Verizon Corporation Services Group Inc.Method and apparatus for providing adaptive self-synchronized dynamic address translation
US6445688B1 (en)2000-08-312002-09-03Ricochet Networks, Inc.Method and apparatus for selecting a directional antenna in a wireless communication system
US6807577B1 (en)2000-09-142004-10-19International Business Machines CorporationSystem and method for network log-on by associating legacy profiles with user certificates
AU2001288934A1 (en)2000-09-222002-04-02Widcomm Inc.Wireless network and method for providing improved handoff performance
US6973622B1 (en)2000-09-252005-12-06Wireless Valley Communications, Inc.System and method for design, tracking, measurement, prediction and optimization of data communication networks
US6950523B1 (en)2000-09-292005-09-27Intel CorporationSecure storage of private keys
US6975834B1 (en)2000-10-032005-12-13Mineral Lassen LlcMulti-band wireless communication device and method
US6770395B2 (en)*2000-10-232004-08-03Materials And Systems Research, Inc.Internally manifolded, planar solid oxide fuel cell (SOFC) stack with an inexpensive interconnect
DE20019677U1 (en)2000-11-202001-02-15Hirschmann Electronics GmbH & Co. KG, 72654 Neckartenzlingen Antenna system
US7171475B2 (en)2000-12-012007-01-30Microsoft CorporationPeer networking host framework and hosting API
AU2001225247A1 (en)2000-12-072002-06-18Alexia BelloneMultiple-triggering alarm system by transmitters and portable receiver-buzzer
JP4531969B2 (en)2000-12-212010-08-25三菱電機株式会社 Adaptive antenna receiver
KR100353623B1 (en)2000-12-222002-09-28주식회사 케이티프리텔Applying Method for Small Group Multicast in Mobile IP
US6400332B1 (en)2001-01-032002-06-04Hon Hai Precision Ind. Co., Ltd.PCB dipole antenna
US6888893B2 (en)2001-01-052005-05-03Microsoft CorporationSystem and process for broadcast and communication with very low bit-rate bi-level or sketch video
US6931429B2 (en)2001-04-272005-08-16Left Gate Holdings, Inc.Adaptable wireless proximity networking
US7916794B2 (en)2001-04-282011-03-29Microsoft CorporationSystem and process for broadcast and communication with very low bit-rate bi-level or sketch video
US6864852B2 (en)2001-04-302005-03-08Ipr Licensing, Inc.High gain antenna for wireless applications
US6606057B2 (en)2001-04-302003-08-12Tantivy Communications, Inc.High gain planar scanned antenna array
US20040152492A1 (en)2001-05-142004-08-05Andrew GrayAntenna interface protocol
US7444513B2 (en)2001-05-142008-10-28Nokia CorporiationAuthentication in data communication
US8284739B2 (en)2001-05-242012-10-09Vixs Systems, Inc.Method and apparatus for affiliating a wireless device with a wireless local area network
US20040030900A1 (en)2001-07-132004-02-12Clark James R.Undetectable watermarking technique for audio media
US6781999B2 (en)2001-07-232004-08-24Airvana, Inc.Broadcasting and multicasting in wireless communication
WO2003017125A1 (en)2001-08-072003-02-27Tatara Systems, Inc.Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks
US6836254B2 (en)2001-08-102004-12-28Antonis KalisAntenna system
EP1333576B1 (en)2001-09-062008-08-20Matsushita Electric Industrial Co., Ltd.Radio terminal with array antenna apparatus
US7697523B2 (en)2001-10-032010-04-13Qualcomm IncorporatedMethod and apparatus for data packet transport in a wireless communication system using an internet protocol
JP4135861B2 (en)2001-10-032008-08-20日本電波工業株式会社 Multi-element planar antenna
US6674459B2 (en)2001-10-242004-01-06Microsoft CorporationNetwork conference recording system and method including post-conference processing
US6828948B2 (en)2001-10-312004-12-07Lockheed Martin CorporationBroadband starfish antenna and array thereof
US7181620B1 (en)2001-11-092007-02-20Cisco Technology, Inc.Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
US6774854B2 (en)2001-11-162004-08-10Galtronics, Ltd.Variable gain and variable beamwidth antenna (the hinged antenna)
US7363354B2 (en)2001-11-292008-04-22Nokia CorporationSystem and method for identifying and accessing network services
US7986937B2 (en)2001-12-202011-07-26Microsoft CorporationPublic access point
US7050809B2 (en)2001-12-272006-05-23Samsung Electronics Co., Ltd.System and method for providing concurrent data transmissions in a wireless communication network
JP2003198437A (en)2001-12-282003-07-11Matsushita Electric Ind Co Ltd Multi-antenna device, multi-antenna receiving method, and multi-antenna transmitting method
US7146433B2 (en)2002-02-012006-12-05Lenovo Singapore Pte. LtdExtending an allowable transmission distance between a wireless device and an access point by communication with intermediate wireless devices
US6888504B2 (en)2002-02-012005-05-03Ipr Licensing, Inc.Aperiodic array antenna
US6842141B2 (en)2002-02-082005-01-11Virginia Tech Inellectual Properties Inc.Fourpoint antenna
US7966497B2 (en)*2002-02-152011-06-21Qualcomm IncorporatedSystem and method for acoustic two factor authentication
US6781544B2 (en)2002-03-042004-08-24Cisco Technology, Inc.Diversity antenna for UNII access point
JP3843027B2 (en)2002-03-122006-11-08日東電工株式会社 Method for manufacturing printed wiring board
US6819287B2 (en)2002-03-152004-11-16Centurion Wireless Technologies, Inc.Planar inverted-F antenna including a matching network having transmission line stubs and capacitor/inductor tank circuits
US20030184490A1 (en)2002-03-262003-10-02Raiman Clifford E.Sectorized omnidirectional antenna
US6809691B2 (en)2002-04-052004-10-26Matsushita Electric Industrial Co., Ltd.Directivity controllable antenna and antenna unit using the same
US6711678B2 (en)2002-04-052004-03-23Expand Beyond CorporationPre-authenticated communication within a secure computer network
FI121519B (en)2002-04-092010-12-15Pulse Finland Oy Directionally adjustable antenna
CN1414731A (en)*2002-04-112003-04-30深圳汇丰信息技术开发有限公司Dynamic word command identification method and its system
US20030196084A1 (en)2002-04-122003-10-16Emeka OkerekeSystem and method for secure wireless communications using PKI
US6753825B2 (en)2002-04-232004-06-22BroadcomPrinted antenna and applications thereof
US7006467B2 (en)2002-04-292006-02-28Hereuare Communications, Inc.Method and system for simulating multiple independent client devices in a wired or wireless network
JP4194046B2 (en)*2002-05-012008-12-10テレフオンアクチーボラゲット エル エム エリクソン(パブル) SIM-based authentication and encryption system, apparatus and method for wireless local area network access
GB0211644D0 (en)2002-05-212002-07-03Wesby Philip BSystem and method for remote asset management
TW557604B (en)2002-05-232003-10-11Realtek Semiconductor CorpPrinted antenna structure
US7026993B2 (en)2002-05-242006-04-11Hitachi Cable, Ltd.Planar antenna and array antenna
JP2004064743A (en)2002-06-052004-02-26Fujitsu LtdAdaptive antenna device
JP3835404B2 (en)2002-06-242006-10-18株式会社村田製作所 High frequency switch and electronic device using the same
US6753814B2 (en)2002-06-272004-06-22Harris CorporationDipole arrangements using dielectric substrates of meta-materials
US6750813B2 (en)2002-07-242004-06-15Mcnc Research & Development InstitutePosition optimized wireless communication
US20040017860A1 (en)2002-07-292004-01-29Jung-Tao LiuMultiple antenna system for varying transmission streams
ES2221535B1 (en)2002-07-312006-03-01Airtel Movil, S.A. A MOBILE TELEPHONY DEVICE AND A DATA MANAGEMENT METHOD.
US20040097217A1 (en)2002-08-062004-05-20Mcclain FredSystem and method for providing authentication and authorization utilizing a personal wireless communication device
US7522906B2 (en)2002-08-092009-04-21Wavelink CorporationMobile unit configuration management for WLANs
US20040036654A1 (en)2002-08-212004-02-26Steve HsiehAntenna assembly for circuit board
US7234063B1 (en)2002-08-272007-06-19Cisco Technology, Inc.Method and apparatus for generating pairwise cryptographic transforms based on group keys
US6941143B2 (en)2002-08-292005-09-06Thomson Licensing, S.A.Automatic channel selection in a radio access network
US7046989B2 (en)2002-09-122006-05-16Broadcom CorporationControlling and enhancing handoff between wireless access points
TW560107B (en)2002-09-242003-11-01Gemtek Technology Co LtdAntenna structure of multi-frequency printed circuit
US6963314B2 (en)2002-09-262005-11-08Andrew CorporationDynamically variable beamwidth and variable azimuth scanning antenna
US7212499B2 (en)2002-09-302007-05-01Ipr Licensing, Inc.Method and apparatus for antenna steering for WLAN
US7882346B2 (en)2002-10-152011-02-01Qualcomm IncorporatedMethod and apparatus for providing authentication, authorization and accounting to roaming nodes
JP2004140458A (en)2002-10-152004-05-13Toshiba Corp Electronic device having wireless communication function and antenna unit for wireless communication
US7562393B2 (en)2002-10-212009-07-14Alcatel-Lucent Usa Inc.Mobility access gateway
US7705782B2 (en)2002-10-232010-04-27Southern Methodist UniversityMicrostrip array antenna
US20040121749A1 (en)2002-11-062004-06-24Engim, Inc.System throughput enhancement using an intelligent channel association in the environment of multiple access channels
US6762723B2 (en)2002-11-082004-07-13Motorola, Inc.Wireless communication device having multiband antenna
US20050152305A1 (en)*2002-11-252005-07-14Fujitsu LimitedApparatus, method, and medium for self-organizing multi-hop wireless access networks
US9237514B2 (en)2003-02-282016-01-12Apple Inc.System and method for filtering access points presented to a user and locking onto an access point
US6961028B2 (en)2003-01-172005-11-01Lockheed Martin CorporationLow profile dual frequency dipole antenna structure
US20040153647A1 (en)2003-01-312004-08-05Rotholtz Ben AaronMethod and process for transmitting video content
JP4214793B2 (en)2003-02-192009-01-28日本電気株式会社 Wireless communication system, server, base station, mobile terminal, and retransmission timeout time determination method used for them
GB2398707B (en)2003-02-212005-03-30Schlumberger HoldingsAuthentication method for enabling a user of a mobile station to access to private data or services
ITRM20030100A1 (en)2003-03-062004-09-07Telecom Italia Mobile Spa TECHNIQUE OF MULTIPLE ACCESS TO THE NETWORK BY USER TERMINAL INTERCONNECTED TO A LAN AND RELATED REFERENCE ARCHITECTURE.
US20060179305A1 (en)*2004-03-112006-08-10Junbiao ZhangWLAN session management techniques with secure rekeying and logoff
MXPA05009804A (en)*2003-03-142006-05-19Thomson LicensingWlan session management techniques with secure rekeying and logoff.
US7269174B2 (en)2003-03-282007-09-11Modular Mining Systems, Inc.Dynamic wireless network
CN1774907A (en)2003-04-152006-05-17汤姆森特许公司 Technology that provides seamless access for both guest and local users at enterprise hotspots
US7142851B2 (en)2003-04-282006-11-28Thomson LicensingTechnique for secure wireless LAN access
US8751801B2 (en)2003-05-092014-06-10Emc CorporationSystem and method for authenticating users using two or more factors
JP2004343448A (en)2003-05-152004-12-02Matsushita Electric Ind Co Ltd Wireless LAN access authentication system
US7421578B1 (en)*2003-07-222008-09-02Cisco Technology, Inc.Method and apparatus for electing a leader node in a computer network
US20050042988A1 (en)2003-08-182005-02-24AlcatelCombined open and closed loop transmission diversity system
US7185204B2 (en)2003-08-282007-02-27International Business Machines CorporationMethod and system for privacy in public networks
JP2005078493A (en)*2003-09-022005-03-24Renesas Technology CorpMicrocomputer
US20060016815A1 (en)*2003-11-032006-01-26Hajo RieckAnti rotation bead
US20050100166A1 (en)2003-11-102005-05-12Parc Inc.Systems and methods for authenticating communications in a network medium
US7239696B2 (en)2003-12-152007-07-03International Business Machines CorporationAutomatic reset for DSL lines
US20050138137A1 (en)2003-12-192005-06-23Microsoft CorporationUsing parameterized URLs for retrieving resource content items
US7668939B2 (en)2003-12-192010-02-23Microsoft CorporationRouting of resource information in a network
US7292870B2 (en)2003-12-242007-11-06Zipit Wireless, Inc.Instant messaging terminal adapted for Wi-Fi access points
DE10361634A1 (en)2003-12-302005-08-04Advanced Micro Devices, Inc., Sunnyvale Powerful low-cost monopole antenna for radio applications
US7860978B2 (en)2004-01-222010-12-28Toshiba America Research, Inc.Establishing a secure tunnel to access router
US7440764B2 (en)2004-02-122008-10-21Motorola, Inc.Method and apparatus for improving throughput in a wireless local area network
US7197502B2 (en)2004-02-182007-03-27Friendly Polynomials, Inc.Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
US7600113B2 (en)2004-02-202009-10-06Microsoft CorporationSecure network channel
US7477894B1 (en)2004-02-232009-01-13Foundry Networks, Inc.Methods and apparatus for handling wireless roaming among and across wireless area networks
US7565529B2 (en)*2004-03-042009-07-21Directpointe, Inc.Secure authentication and network management system for wireless LAN applications
JP4564957B2 (en)*2004-03-082010-10-20グローバルフレンドシップ株式会社 Electronic terminal device protection system
KR20050097674A (en)2004-04-022005-10-10삼성전자주식회사Internet connection service method of mobile node and system thereof
US7539862B2 (en)2004-04-082009-05-26Ipass Inc.Method and system for verifying and updating the configuration of an access device during authentication
CN100413368C (en)*2004-04-232008-08-20华为技术有限公司 A verification method for user card legitimacy
US20050250472A1 (en)2004-05-042005-11-10Silvester Kelan CUser authentication using a wireless device
US20050261970A1 (en)2004-05-212005-11-24Wayport, Inc.Method for providing wireless services
US7043277B1 (en)2004-05-272006-05-09Autocell Laboratories, Inc.Automatically populated display regions for discovered access points and stations in a user interface representing a wireless communication network deployed in a physical environment
CN100438681C (en)2004-06-042008-11-26上海环达计算机科技有限公司Identification method and system for mobile equipment
JP2005354249A (en)2004-06-092005-12-22Matsushita Electric Ind Co Ltd Network communication terminal
JP4095585B2 (en)2004-06-172008-06-04株式会社東芝 Wireless communication method, wireless communication device, and wireless communication system
JP2006050267A (en)2004-08-042006-02-16Matsushita Electric Ind Co Ltd IPsec communication method, communication control apparatus, and network camera
JP2006060408A (en)2004-08-182006-03-02Nippon Telegr & Teleph Corp <Ntt> Radio packet communication method and radio station
US20060080415A1 (en)*2004-08-272006-04-13Tu Edgar AMethods and apparatuses for automatically synchronizing a profile across multiple devices
US7355998B2 (en)2004-09-012008-04-08Interdigital Technology CorporationSupport for multiple access point switched beam antennas
EP1638261A1 (en)2004-09-162006-03-22Matsushita Electric Industrial Co., Ltd.Configuring connection parameters in a handover between access networks
CN101923613A (en)*2004-10-082010-12-22松下电器产业株式会社Authentication system
US7263076B1 (en)*2004-10-092007-08-28Radiuz Networks LlcSystem and method for managing a wireless network community
US7644272B2 (en)*2004-10-222010-01-05Broadcom CorporationSystems and methods for providing security to different functions
US20060089123A1 (en)*2004-10-222006-04-27Frank Edward HUse of information on smartcards for authentication and encryption
US7606187B2 (en)2004-10-282009-10-20Meshnetworks, Inc.System and method to support multicast routing in large scale wireless mesh networks
US7512379B2 (en)2004-10-292009-03-31Hien NguyenWireless access point (AP) automatic channel selection
US8272874B2 (en)2004-11-222012-09-25Bravobrava L.L.C.System and method for assisting language learning
US20060123455A1 (en)2004-12-022006-06-08Microsoft CorporationPersonal media channel
US8913625B2 (en)2004-12-172014-12-16Verizon Patent And Licensing Inc.System and method for providing service-agnostic network resources
US8885539B2 (en)2005-01-262014-11-11Hewlett-Packard Development Company, L.P.Configurable quality-of-service support per virtual access point (VAP) in a wireless LAN (WLAN) access device
US7640329B2 (en)2005-02-152009-12-29Microsoft CorporationScaling and extending UPnP v1.0 device discovery using peer groups
US7647394B2 (en)2005-02-152010-01-12Microsoft CorporationScaling UPnP v1.0 device eventing using peer groups
TWI262342B (en)2005-02-182006-09-21Au Optronics CorpDevice for fastening lighting unit in backlight module
TWI275810B (en)2005-03-022007-03-11Askey Computer CorpInspection system of cable modem
US8725138B2 (en)2005-03-302014-05-13Alcatel LucentMethods for network selection and discovery of service information in public wireless hotspots
US7761601B2 (en)2005-04-012010-07-20Microsoft CorporationStrategies for transforming markup content to code-bearing content for consumption by a receiving device
US20060225107A1 (en)2005-04-012006-10-05Microsoft CorporationSystem for running applications in a resource-constrained set-top box environment
US8532304B2 (en)2005-04-042013-09-10Nokia CorporationAdministration of wireless local area networks
US7636300B2 (en)2005-04-072009-12-22Microsoft CorporationPhone-based remote media system interaction
US7562385B2 (en)*2005-04-202009-07-14Fuji Xerox Co., Ltd.Systems and methods for dynamic authentication using physical keys
TWI274511B (en)2005-04-252007-02-21Benq CorpChannel selection method over WLAN
US7505434B1 (en)2005-06-232009-03-17Autocell Laboratories, Inc.VLAN tagging in WLANs
US7427941B2 (en)2005-07-012008-09-23Microsoft CorporationState-sensitive navigation aid
FI120254B (en)*2005-07-072009-08-31Nixu Oy A method of storing a training performance for a user of an exercise device as well as an exercise device
US7599300B2 (en)2005-08-312009-10-06Time Warner Cable, Inc.Cable modem analysis system and method therefor for an HFC cable network
US20070055752A1 (en)2005-09-082007-03-08FiberlinkDynamic network connection based on compliance
US9167053B2 (en)2005-09-292015-10-20Ipass Inc.Advanced network characterization
US20070091848A1 (en)*2005-10-032007-04-26Snehal KariaReducing data loss during handoffs in wireless communication
US7512677B2 (en)2005-10-202009-03-31Uplogix, Inc.Non-centralized network device management using console communications system and method
EP1958369B1 (en)2005-12-012015-04-08Ruckus Wireless, Inc.On-demand services by wireless base station virtualization
US20070130294A1 (en)2005-12-022007-06-07Leo NishioMethods and apparatus for communicating with autonomous devices via a wide area network
US7613482B2 (en)2005-12-082009-11-03Accton Technology CorporationMethod and system for steering antenna beam
US8005459B2 (en)*2005-12-162011-08-23Research In Motion LimitedSystem and method of authenticating login credentials in a wireless communication system
EP1802155A1 (en)*2005-12-212007-06-27Cronto LimitedSystem and method for dynamic multifactor authentication
US8091120B2 (en)*2005-12-212012-01-03At&T Intellectual Property I, L.P.Adaptive authentication methods, systems, devices, and computer program products
US20070150736A1 (en)2005-12-222007-06-28Cukier Johnas IToken-enabled authentication for securing mobile devices
WO2007071009A1 (en)2005-12-232007-06-28Bce Inc.Wireless device authentication between different networks
US20070165582A1 (en)*2006-01-182007-07-19Puneet BattaSystem and method for authenticating a wireless computing device
WO2007095240A2 (en)*2006-02-132007-08-23Tricipher, Inc.Flexible and adjustable authentication in cyberspace
CN1859098A (en)*2006-03-082006-11-08华为技术有限公司Method for realizing EAP identification relay in radio cut-in system
US7873573B2 (en)2006-03-302011-01-18Obopay, Inc.Virtual pooled account for mobile banking
US9071583B2 (en)2006-04-242015-06-30Ruckus Wireless, Inc.Provisioned configuration for automatic wireless connection
EP2013758B1 (en)2006-04-242016-08-03Ruckus Wireless, Inc.Dynamic authentication in secured wireless networks
US8260278B2 (en)2006-05-122012-09-04The Mitre CorporationFramework for agile mobile applications
JP4684946B2 (en)2006-05-302011-05-18株式会社日立産機システム Monitoring device
US7881474B2 (en)2006-07-172011-02-01Nortel Networks LimitedSystem and method for secure wireless multi-hop network formation
US9326138B2 (en)2006-09-062016-04-26Devicescape Software, Inc.Systems and methods for determining location over a network
US8549588B2 (en)2006-09-062013-10-01Devicescape Software, Inc.Systems and methods for obtaining network access
US8743778B2 (en)2006-09-062014-06-03Devicescape Software, Inc.Systems and methods for obtaining network credentials
TW200816768A (en)2006-09-212008-04-01Interdigital Tech CorpGroup-wise secret key generation
JP2008088633A (en)2006-09-292008-04-17Taiheiyo Cement CorpBurying type form made of polymer cement mortar
US8108904B1 (en)2006-09-292012-01-31Juniper Networks, Inc.Selective persistent storage of controller information
TWI327036B (en)2006-10-052010-07-01Ind Tech Res InstLoad balancing apparatus and method in wireless network hotspots
US7599380B2 (en)2006-10-132009-10-06Cox Communications, Inc.Resetting a multimedia terminal adapter
US8060916B2 (en)2006-11-062011-11-15Symantec CorporationSystem and method for website authentication using a shared secret
US8645948B2 (en)2006-12-122014-02-04Qualcomm IncorporatedApparatus and methods for client-driven server-side installation
WO2008156782A2 (en)2007-06-192008-12-24Sand Holdings, LlcDevices and methods for automatic reset of monitored network network equipment
US8463238B2 (en)2007-06-282013-06-11Apple Inc.Mobile device base station
JP4881813B2 (en)2007-08-102012-02-22キヤノン株式会社 COMMUNICATION DEVICE, COMMUNICATION DEVICE COMMUNICATION METHOD, PROGRAM, AND STORAGE MEDIUM
US7941663B2 (en)2007-10-232011-05-10Futurewei Technologies, Inc.Authentication of 6LoWPAN nodes using EAP-GPSK
US8347355B2 (en)2008-01-172013-01-01Aerohive Networks, Inc.Networking as a service: delivering network services using remote appliances controlled via a hosted, multi-tenant management system
US8250207B2 (en)2009-01-282012-08-21Headwater Partners I, LlcNetwork based ambient services
US8351898B2 (en)2009-01-282013-01-08Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8732451B2 (en)2009-05-202014-05-20Microsoft CorporationPortable secure computing network
US20110035624A1 (en)2009-08-072011-02-10Green Networks, Inc.Intelligent power control
JP5053424B2 (en)2010-07-292012-10-17株式会社バッファロー RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD
JP5348094B2 (en)2010-08-312013-11-20ブラザー工業株式会社 Support device and computer program
US8918393B2 (en)2010-09-292014-12-23International Business Machines CorporationIdentifying a set of candidate entities for an identity record
US8699379B2 (en)2011-04-082014-04-15Blackberry LimitedConfiguring mobile station according to type of wireless local area network (WLAN) deployment
CN103858106B (en)2011-05-012017-04-26鲁库斯无线公司remote cable access point reset
US20120284785A1 (en)2011-05-052012-11-08Motorola Mobility, Inc.Method for facilitating access to a first access nework of a wireless communication system, wireless communication device, and wireless communication system
US8590023B2 (en)2011-06-302013-11-19Intel CorporationMobile device and method for automatic connectivity, data offloading and roaming between networks
US9220065B2 (en)2012-01-162015-12-22Smith Micro Software, Inc.Enabling a mobile broadband hotspot by an auxiliary radio
US8756668B2 (en)2012-02-092014-06-17Ruckus Wireless, Inc.Dynamic PSK for hotspots
US9092610B2 (en)2012-04-042015-07-28Ruckus Wireless, Inc.Key assignment for a brand
US9258704B2 (en)2012-06-272016-02-09Advanced Messaging Technologies, Inc.Facilitating network login

Also Published As

Publication numberPublication date
WO2007127120A2 (en)2007-11-08
US7788703B2 (en)2010-08-31
US20120317625A1 (en)2012-12-13
US8272036B2 (en)2012-09-18
US20090092255A1 (en)2009-04-09
WO2007127162A3 (en)2008-11-20
US20140068724A1 (en)2014-03-06
US20070249324A1 (en)2007-10-25
WO2007127162A2 (en)2007-11-08
EP2013758A2 (en)2009-01-14
EP2014067B1 (en)2019-10-02
WO2007127120A3 (en)2008-05-08
US20110055898A1 (en)2011-03-03
EP2014067A4 (en)2010-01-06
US7669232B2 (en)2010-02-23
US9131378B2 (en)2015-09-08
CN103441984A (en)2013-12-11
EP2013758A4 (en)2012-01-25
WO2007127162A8 (en)2008-09-18
CN103441984B (en)2017-09-05
US8607315B2 (en)2013-12-10
EP2014067A2 (en)2009-01-14

Similar Documents

PublicationPublication DateTitle
EP2013758B1 (en)Dynamic authentication in secured wireless networks
US9769655B2 (en)Sharing security keys with headless devices
US8555344B1 (en)Methods and systems for fallback modes of operation within wireless computer networks
JP3961462B2 (en) Computer apparatus, wireless LAN system, profile updating method, and program
JP4777729B2 (en) Setting information distribution apparatus, method, program, and medium
US9071583B2 (en)Provisioned configuration for automatic wireless connection
CN101455053B (en)Authenticating an application
US8019082B1 (en)Methods and systems for automated configuration of 802.1x clients
JP6337642B2 (en) Method for securely accessing a network from a personal device, personal device, network server, and access point
JP2003500923A (en) Method, computer program and device for initializing secure communication and exclusively pairing devices
JP6079394B2 (en) Certificate generation method, certificate generation apparatus, information processing apparatus, communication device, and program
EP1629655A1 (en)Methods and systems of remote authentication for computer networks
KR20040042247A (en)The method and system for performing authentification to obtain access to public wireless LAN
JP2003204338A (en)Radio lan system, method for controlling accessing and program
CN101986598B (en)Authentication method, server and system
US20110252237A1 (en)Authorizing Remote Access Points
KR20240167060A (en) WPA3 Cloud-based Network Access and Provisioning
CN108429726B (en)Secure WIFI certificate encryption verification access method and system thereof
JP4018584B2 (en) Wireless connection device authentication method and wireless connection device
JP2008160384A (en)Wireless lan terminal, electronic certificate updating method and program thereof, and wireless lan system
CN101454767B (en) Dynamic Authentication in Secure Wireless Networks
KR100459935B1 (en)A Method For User authentication in Public Wireless Lan Service Network
CN114793335A (en)Wireless local area network access method based on password dynamic change

Legal Events

DateCodeTitleDescription
PUAIPublic reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text:ORIGINAL CODE: 0009012

17PRequest for examination filed

Effective date:20081121

AKDesignated contracting states

Kind code of ref document:A2

Designated state(s):AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AXRequest for extension of the european patent

Extension state:AL BA HR MK RS

A4Supplementary search report drawn up and despatched

Effective date:20111229

RIC1Information provided on ipc code assigned before grant

Ipc:H04L 29/06 20060101ALN20111222BHEP

Ipc:G06F 21/00 20060101ALI20111222BHEP

Ipc:G06F 15/173 20060101AFI20111222BHEP

DAXRequest for extension of the european patent (deleted)
17QFirst examination report despatched

Effective date:20121023

RAP1Party data changed (applicant data changed or rights of an application transferred)

Owner name:RUCKUS WIRELESS, INC.

RIN1Information on inventor provided before grant (corrected)

Inventor name:JOU, TYAN-SHU

Inventor name:YANG, BO-CHIEH

Inventor name:KUO, TED TSEI

Inventor name:LIN, TIAN-YUAN

Inventor name:SHEU, MING

GRAPDespatch of communication of intention to grant a patent

Free format text:ORIGINAL CODE: EPIDOSNIGR1

RIC1Information provided on ipc code assigned before grant

Ipc:H04W 12/06 20090101ALI20160201BHEP

Ipc:G06F 21/00 20130101ALI20160201BHEP

Ipc:G06F 15/173 20060101AFI20160201BHEP

Ipc:H04L 29/06 20060101ALN20160201BHEP

Ipc:H04W 12/04 20090101ALI20160201BHEP

Ipc:H04W 12/08 20090101ALI20160201BHEP

Ipc:H04W 8/18 20090101ALI20160201BHEP

INTGIntention to grant announced

Effective date:20160217

GRASGrant fee paid

Free format text:ORIGINAL CODE: EPIDOSNIGR3

GRAA(expected) grant

Free format text:ORIGINAL CODE: 0009210

AKDesignated contracting states

Kind code of ref document:B1

Designated state(s):AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

REGReference to a national code

Ref country code:GB

Ref legal event code:FG4D

REGReference to a national code

Ref country code:CH

Ref legal event code:EP

Ref country code:AT

Ref legal event code:REF

Ref document number:817767

Country of ref document:AT

Kind code of ref document:T

Effective date:20160815

REGReference to a national code

Ref country code:IE

Ref legal event code:FG4D

REGReference to a national code

Ref country code:DE

Ref legal event code:R096

Ref document number:602007047273

Country of ref document:DE

REGReference to a national code

Ref country code:NL

Ref legal event code:MP

Effective date:20160803

REGReference to a national code

Ref country code:LT

Ref legal event code:MG4D

REGReference to a national code

Ref country code:AT

Ref legal event code:MK05

Ref document number:817767

Country of ref document:AT

Kind code of ref document:T

Effective date:20160803

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:LT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:IT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:IS

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20161203

Ref country code:NL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:FI

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:PT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20161205

Ref country code:ES

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:PL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:GR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20161104

Ref country code:SE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:LV

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:AT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:RO

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:EE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

REGReference to a national code

Ref country code:DE

Ref legal event code:R097

Ref document number:602007047273

Country of ref document:DE

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:CZ

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:BE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:DK

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:SK

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:BG

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20161103

PLBENo opposition filed within time limit

Free format text:ORIGINAL CODE: 0009261

STAAInformation on the status of an ep patent application or granted ep patent

Free format text:STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26NNo opposition filed

Effective date:20170504

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:SI

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

REGReference to a national code

Ref country code:CH

Ref legal event code:PL

REGReference to a national code

Ref country code:IE

Ref legal event code:MM4A

REGReference to a national code

Ref country code:FR

Ref legal event code:ST

Effective date:20171229

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:MC

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

Ref country code:FR

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20170502

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:LI

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20170430

Ref country code:LU

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20170418

Ref country code:CH

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20170430

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:IE

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20170418

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:MT

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20170418

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:HU

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date:20070418

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:CY

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20160803

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:TR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160803

REGReference to a national code

Ref country code:GB

Ref legal event code:732E

Free format text:REGISTERED BETWEEN 20230914 AND 20230920

REGReference to a national code

Ref country code:DE

Ref legal event code:R081

Ref document number:602007047273

Country of ref document:DE

Owner name:RUCKUS IP HOLDINGS LLC, CLAREMONT, US

Free format text:FORMER OWNER: RUCKUS WIRELESS, INC., SUNNYVALE, CALIF., US

REGReference to a national code

Ref country code:GB

Ref legal event code:732E

Free format text:REGISTERED BETWEEN 20240201 AND 20240207

PGFPAnnual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code:DE

Payment date:20250429

Year of fee payment:19

PGFPAnnual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code:GB

Payment date:20250428

Year of fee payment:19


[8]ページ先頭

©2009-2025 Movatter.jp